Bump the npm_and_yarn group across 1 directory with 4 updates
Bumps the npm_and_yarn group with 4 updates in the /packages/app directory: body-parser, express, micromatch and ws.
Updates body-parser from 1.20.2 to 1.20.3
Release notes
Sourced from body-parser's releases.
1.20.3
What's Changed
Important
- deps: [email protected]
- add
depthoption to customize the depth level in the parser- IMPORTANT: The default
depthlevel for parsing URL-encoded data is now32(previously wasInfinity). DocumentationOther changes
- chore: add support for OSSF scorecard reporting by
@inigomarquinezin expressjs/body-parser#522- ci: fix errors in ci github action for node 8 and 9 by
@inigomarquinezin expressjs/body-parser#523- fix: pin to [email protected] by
@wesleytoddin expressjs/body-parser#527- deps: [email protected] by
@melikhov-devin expressjs/body-parser#521- Add OSSF Scorecard badge by
@bjohansebasin expressjs/body-parser#531- Linter by
@UlisesGasconin expressjs/body-parser#534- Release: 1.20.3 by
@UlisesGasconin expressjs/body-parser#535New Contributors
@inigomarquinezmade their first contribution in expressjs/body-parser#522@melikhov-devmade their first contribution in expressjs/body-parser#521@bjohansebasmade their first contribution in expressjs/body-parser#531@UlisesGasconmade their first contribution in expressjs/body-parser#534Full Changelog: https://github.com/expressjs/body-parser/compare/1.20.2...1.20.3
Changelog
Sourced from body-parser's changelog.
1.20.3 / 2024-09-10
- deps: [email protected]
- add
depthoption to customize the depth level in the parser- IMPORTANT: The default
depthlevel for parsing URL-encoded data is now32(previously wasInfinity)
Commits
17529511.20.339744cfchore: linter (#534)b2695c4Merge commit from forkade0f3fadd scorecard to readme (#531)99a1bd6deps: [email protected] (#521)9478591fix: pin to [email protected]83db46aci: fix errors in ci github action for node 8 and 9 (#523)9d4e212chore: add support for OSSF scorecard reporting (#522)- See full diff in compare view
Maintainer changes
This version was pushed to npm by ulisesgascon, a new releaser for body-parser since your current version.
Updates express from 4.19.2 to 4.20.0
Release notes
Sourced from express's releases.
4.20.0
What's Changed
Important
- IMPORTANT: The default
depthlevel for parsing URL-encoded data is now32(previously wasInfinity)- Remove link renderization in html while using
res.redirectOther Changes
- 4.19.2 Staging by
@wesleytoddin expressjs/express#5561- remove duplicate location test for data uri by
@wesleytoddin expressjs/express#5562- feat: document beta releases expectations by
@marco-ippolitoin expressjs/express#5565- Cut down on duplicated CI runs by
@jonchurchin expressjs/express#5564- Add a Threat Model by
@UlisesGasconin expressjs/express#5526- Assign captain of encodeurl by
@blakeembreyin expressjs/express#5579- Nominate jonchurch as repo captain for
http-errors,expressjs.com,morgan,cors,body-parserby@jonchurchin expressjs/express#5587- docs: update Security.md by
@inigomarquinezin expressjs/express#5590- docs: update triage nomination policy by
@UlisesGasconin expressjs/express#5600- Add CodeQL (SAST) by
@UlisesGasconin expressjs/express#5433- docs: add UlisesGascon as triage initiative captain by
@UlisesGasconin expressjs/express#5605- deps: encodeurl@~2.0.0 by
@blakeembreyin expressjs/express#5569- skip QUERY method test by
@jonchurchin expressjs/express#5628- ignore ETAG query test on 21 and 22, reuse skip util by
@jonchurchin expressjs/express#5639- add support Node.js@22 in the CI by
@mertcanaltinin expressjs/express#5627- doc: add table of contents, tc/triager lists to readme by
@mertcanaltinin expressjs/express#5619- List and sort all projects, add captains by
@blakeembreyin expressjs/express#5653- docs: add
@UlisesGasconas captain for cookie-parser by@UlisesGasconin expressjs/express#5666- ✨ bring back query tests for node 21 by
@ctcpipin expressjs/express#5690- [v4] Deprecate
res.clearCookieacceptingoptions.maxAgeandoptions.expiresby@jonchurchin expressjs/express#5672- skip QUERY tests for Node 21 only, still not supported by
@jonchurchin expressjs/express#5695- 📝 update people, add ctcpip to TC by
@ctcpipin expressjs/express#5683- remove minor version pinning from ci by
@jonchurchin expressjs/express#5722- Fix link variable use in attribution section of CODE OF CONDUCT by
@IamLizuin expressjs/express#5762- Replace Appveyor windows testing with GHA by
@jonchurchin expressjs/express#5599- Add OSSF Scorecard badge by
@UlisesGasconin expressjs/express#5436- update scorecard link by
@bjohansebasin expressjs/express#5814- Nominate
@IamLizuto the triage team by@UlisesGasconin expressjs/express#5836- deps: [email protected] by
@blakeembreyin expressjs/express#5603- docs: specify new instructions for
questionanddiscussby@IamLizuin expressjs/express#5835- 4.x: Upgrade
merge-descriptorsdependency by@RobinTailin expressjs/express#5781- [email protected] by
@blakeembreyin expressjs/express#5902New Contributors
@marco-ippolitomade their first contribution in expressjs/express#5565@inigomarquinezmade their first contribution in expressjs/express#5590@mertcanaltinmade their first contribution in expressjs/express#5627@ctcpipmade their first contribution in expressjs/express#5690@bjohansebasmade their first contribution in expressjs/express#5814Full Changelog: https://github.com/expressjs/express/compare/4.19.1...4.20.0
Changelog
Sourced from express's changelog.
4.20.0 / 2024-09-10
- deps: [email protected]
- Remove link renderization in html while redirecting
- deps: [email protected]
- Remove link renderization in html while redirecting
- deps: [email protected]
- add
depthoption to customize the depth level in the parser- IMPORTANT: The default
depthlevel for parsing URL-encoded data is now32(previously wasInfinity)- Remove link renderization in html while using
res.redirect- deps: [email protected]
- Adds support for named matching groups in the routes using a regex
- Adds backtracking protection to parameters without regexes defined
- deps: encodeurl@~2.0.0
- Removes encoding of
\,|, and^to align better with URL spec- Deprecate passing
options.maxAgeandoptions.expirestores.clearCookie
- Will be ignored in v5, clearCookie will set a cookie with an expires in the past to instruct clients to delete the cookie
Commits
21df4214.20.04c9ddc1feat: upgrade to [email protected]9ebe5d5feat: upgrade to [email protected] (#5928)ec4a01bfeat: upgrade to [email protected] (#5926)54271f6fix: don't render redirect values in anchor href125bb74[email protected] (#5902)2a980ad[email protected] (#5781)a3e7e05docs: specify new instructions forquestionanddiscussc5addb9deps: [email protected] (#5603)e35380adocs: add@IamLizuto the triage team (#5836)- Additional commits viewable in compare view
Updates micromatch from 4.0.5 to 4.0.8
Release notes
Sourced from micromatch's releases.
4.0.8
Ultimate release that fixes both CVE-2024-4067 and CVE-2024-4068. We consider the issues low-priority, so even if you see automated scanners saying otherwise, don't be scared.
Changelog
Sourced from micromatch's changelog.
[4.0.8] - 2024-08-22
- backported CVE-2024-4067 fix (from v4.0.6) over to 4.x branch
[4.0.7] - 2024-05-22
- this is basically v4.0.5, with some README updates
- it is vulnerable to CVE-2024-4067
- Updated braces to v3.0.3 to avoid CVE-2024-4068
- does NOT break API compatibility
[4.0.6] - 2024-05-21
- Added
hasBracesto check if a pattern contains braces.- Fixes CVE-2024-4067
- BREAKS API COMPATIBILITY
- Should be labeled as a major release, but it's not.
Commits
8bd704e4.0.8a0e6841run verb to generate README documentation4ec2884Merge branch 'v4' into hauserkristof-feature/v4.0.803aa805Merge pull request #266 from hauserkristof/feature/v4.0.8814f5f7lint67fcce6fix: CHANGELOG about braces & CVE-2024-4068, v4.0.5113f2e3fix: CVE numbers in CHANGELOGd9dbd9afeat: updated CHANGELOG2ab1315fix: use actions/setup-node@v41406ea3feat: rework test to work on macos with node 10,12 and 14- Additional commits viewable in compare view
Updates ws from 8.13.0 to 8.17.1
Release notes
Sourced from ws's releases.
8.17.1
Bug fixes
- Fixed a DoS vulnerability (#2231).
A request with a number of headers exceeding the[
server.maxHeadersCount][] threshold could be used to crash a ws server.const http = require('http'); const WebSocket = require('ws');const wss = new WebSocket.Server({ port: 0 }, function () { const chars = "!#$%&'*+-.0123456789abcdefghijklmnopqrstuvwxyz^_`|~".split(''); const headers = {}; let count = 0;
for (let i = 0; i < chars.length; i++) { if (count === 2000) break;
for (let j = 0; j < chars.length; j++) { const key = chars[i] + chars[j]; headers[key] = 'x';if (++count === 2000) break; }
}
headers.Connection = 'Upgrade'; headers.Upgrade = 'websocket'; headers['Sec-WebSocket-Key'] = 'dGhlIHNhbXBsZSBub25jZQ=='; headers['Sec-WebSocket-Version'] = '13';
const request = http.request({ headers: headers, host: '127.0.0.1', port: wss.address().port });
request.end(); });
The vulnerability was reported by Ryan LaPointe in websockets/ws#2230.
In vulnerable versions of ws, the issue can be mitigated in the following ways:
- Reduce the maximum allowed length of the request headers using the [
--max-http-header-size=size][] and/or the [maxHeaderSize][] options so that no more headers than theserver.maxHeadersCountlimit can be sent.
... (truncated)
Commits
3c56601[dist] 8.17.1e55e510[security] Fix crash when the Upgrade header cannot be read (#2231)6a00029[test] Increase code coverageddfe4a8[perf] Reduce the amount ofcrypto.randomFillSync()callsb73b118[dist] 8.17.029694a5[test] Use thehighWaterMarkvariable934c9d6[ci] Test on node 221817bac[ci] Do not test on node 2196c9b3d[major] Flip the default value ofallowSynchronousEvents(#2221)e5f32c7[fix] Emit at most one event per event loop iteration (#2218)- Additional commits viewable in compare view
Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.
Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
@dependabot rebasewill rebase this PR@dependabot recreatewill recreate this PR, overwriting any edits that have been made to it@dependabot mergewill merge this PR after your CI passes on it@dependabot squash and mergewill squash and merge this PR after your CI passes on it@dependabot cancel mergewill cancel a previously requested merge and block automerging@dependabot reopenwill reopen this PR if it is closed@dependabot closewill close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually@dependabot show <dependency name> ignore conditionswill show all of the ignore conditions of the specified dependency@dependabot ignore <dependency name> major versionwill close this group update PR and stop Dependabot creating any more for the specific dependency's major version (unless you unignore this specific dependency's major version or upgrade to it yourself)@dependabot ignore <dependency name> minor versionwill close this group update PR and stop Dependabot creating any more for the specific dependency's minor version (unless you unignore this specific dependency's minor version or upgrade to it yourself)@dependabot ignore <dependency name>will close this group update PR and stop Dependabot creating any more for the specific dependency (unless you unignore this specific dependency or upgrade to it yourself)@dependabot unignore <dependency name>will remove all of the ignore conditions of the specified dependency@dependabot unignore <dependency name> <ignore condition>will remove the ignore condition of the specified dependency and ignore conditions You can disable automated security fix PRs for this repo from the Security Alerts page.